Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    56s
  • max time network
    22s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2024, 17:15

General

  • Target

    bb2ce32c9b9c307eda65a2f13415d6a01c7e9f1261a1872d4c588ac1c599bed5.msi

  • Size

    142.3MB

  • MD5

    d54ab89f2e4dde5633b7fbdf00dbbbe9

  • SHA1

    379709f077da51a5c7ebcbb8fc0a0a0895c20933

  • SHA256

    bb2ce32c9b9c307eda65a2f13415d6a01c7e9f1261a1872d4c588ac1c599bed5

  • SHA512

    c4dc7e0b50419d0b8b660526d83a940c5627e4244b4542322e1d46cf5ad25a702cc5a77bde3653e59561d14596f89966201634dff5a33c1efe79d5b560933189

  • SSDEEP

    3145728:wLva3lK/CCB9nyGp49Hy0+Xb6SQvhS4Y0Cr5pyicNlSuVG/aSWGeW6p:wLvq8nggcvhY0C/yLP/Vaabfp

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 10 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 13 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 43 IoCs
  • Modifies registry class 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\bb2ce32c9b9c307eda65a2f13415d6a01c7e9f1261a1872d4c588ac1c599bed5.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2088
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\ProgramData\jvb\dbeaver.exe
      "C:\ProgramData\jvb\dbeaver.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:2792
    • C:\Windows\system32\wscript.exe
      "wscript.exe" "9.js"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2888
      • C:\ProgramData\jvb\node.exe
        "C:\ProgramData\jvb\node.exe" C:/ProgramData/jvb/node.js
        3⤵
        • Executes dropped EXE
        PID:2920
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1520
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "000000000000059C" "00000000000002FC"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f777f6f.rbs

    Filesize

    9KB

    MD5

    40cc09fdfce80adc43f19e978800d5eb

    SHA1

    31a510628853df545e43efc340f21d88c77e9599

    SHA256

    9728145dc2dfa6f3909f39dcdcc0662e55e62fee3d05fa88a1ffb6da887f7cbc

    SHA512

    66eee6438cf00e9a91231a650a23fd57b69c9fb19ad76fa85c7d5a25aabe7b5c2a1aeb0b95ead943ee889a7ddb3ea87cb621c2c0cf7df06772299cf59f8dd6eb

  • C:\ProgramData\jvb\9.js

    Filesize

    112B

    MD5

    23578f94ff3058c385394a252b27044f

    SHA1

    ffa1adb01394d91628b10025d6a6dcda89853f24

    SHA256

    1dcbcccce710038721185bbcc21f5909c1857d7d755a0ddb9a7d1ccd91143b90

    SHA512

    b3d365e911a17f78230198ef7872ddfe5ac1692ca35f46ac2fb35463210a1cec00ee64087b6117eefcdf4192b729557b6b49f3d79f901f9da385a8a183026562

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C5C8CC0A7FE31816B4641D0465402560

    Filesize

    1KB

    MD5

    e94fb54871208c00df70f708ac47085b

    SHA1

    4efc31460c619ecae59c1bce2c008036d94c84b8

    SHA256

    7b9d553e1c92cb6e8803e137f4f287d4363757f5d44b37d52f9fca22fb97df86

    SHA512

    2e15b76e16264abb9f5ef417752a1cbb75f29c11f96ac7d73793172bd0864db65f2d2b7be0f16bbbe686068f0c368815525f1e39db5a0d6ca3ab18be6923b898

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99394697d0b691ed893ff9177061a485

    SHA1

    e7e5559a37543c2d5e9076c1da1b12228ea2fb5d

    SHA256

    d7aa42579bb13f901bc2343182e72c99259aec69a2b743fc9cd43a41a10d412d

    SHA512

    cf7f01983633dc6f173f25432ad9e48410c86ea972d20095ac3ddf61f7a52b10cf099e8bc8572a07168285e5f5e76c43172c981959d57f65b068e20ba47e7889

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C5C8CC0A7FE31816B4641D0465402560

    Filesize

    264B

    MD5

    ee7bc3bc98099f0891417a047c45227a

    SHA1

    b57477275061f2858577954cd525a5142b3ed247

    SHA256

    16662b1194fd26718e0177b632d1e0fbb8eb6c49b2967796003cf305e120bfba

    SHA512

    33c83d5c163304e9adc84701682aad2c0971aecac054f93620cd8264b76e88dae0c7c03f7c8a5cfd07655b1572efbc2fb2ff3a7e1f3ef3313ebd56ab05b9bfb7

  • C:\Users\Admin\AppData\Local\DBeaver\Uninstall.exe

    Filesize

    365KB

    MD5

    a7e34e78d11326c700d6a7f9f96a8819

    SHA1

    6f001e35fb737411c51b0dd5e00edb7c961f3b35

    SHA256

    76422afc4aefca46c97cc72020ca4309ed072fb2187ecceef16c92adc3421f35

    SHA512

    14df827da079c3988c7167b76d6060f9ee6ba014bd7e77429e55149c0826efce559eeea4ed6d5a53c8abcc2682447180973a5020f1de97cd82941ef94781100d

  • C:\Users\Admin\AppData\Local\DBeaver\features\org.eclipse.ecf.filetransfer.httpclient5.feature_1.1.702.v20231114-1017\epl-2.0.html

    Filesize

    16KB

    MD5

    84283fa8859daf213bdda5a9f8d1be1d

    SHA1

    0cbef63aebcfcd4cd201ebeb48ce294e377a6321

    SHA256

    928c4a6af7e9cf82589e560f98ffbb6ade7385b59fec8cb4ef36a6bb91cf7018

    SHA512

    f4eb2bb38fa8c40b44c714e05b518ded3641529d689552b131613a40a64940d0369263f3afde03a7d289dd88e38c50975527103fc43eb32984e84e8236ab9feb

  • C:\Users\Admin\AppData\Local\DBeaver\features\org.eclipse.ecf.filetransfer.httpclient5.feature_1.1.702.v20231114-1017\license.html

    Filesize

    9KB

    MD5

    618d2440fc58e15450a9416cd6804477

    SHA1

    c501b7ce0b1ee46ad86fff436bcb7dc2cd549dc2

    SHA256

    0efe4d6eb579f748857a93c5a781c3000f70f339074b29d15b914213e14b1d53

    SHA512

    7b48c3911305756ad7d7bf65e5254c5151f619fdd16cd80be01208a8e868f02066a91a872c17824537e6173d9e0cb81c1c5b0081cea6c1cd585c91bcddf6438a

  • C:\Users\Admin\AppData\Local\DBeaver\features\org.eclipse.emf.common_2.30.0.v20230916-0637\META-INF\ECLIPSE_.RSA

    Filesize

    9KB

    MD5

    40fa6729dc1faddf00261da43b73e007

    SHA1

    78150af306cbcb578535589509eac393b8b0b24a

    SHA256

    e794b7c7c7e77ed5a0dc26437a72d12e258e05cd489b4befbbec7422cd0a11f2

    SHA512

    486e7138b5b40ed0e4007c2dd83ce94ca447aee94c968bc4c384fe6d6f2b69fa351cd3106ce88ee2e4ef120db9bb6c4e8990fa9c104da2903c97b7f2f8270078

  • C:\Users\Admin\AppData\Local\DBeaver\jre\legal\java.management\ADDITIONAL_LICENSE_INFO

    Filesize

    49B

    MD5

    19c9d1d2aad61ce9cb8fb7f20ef1ca98

    SHA1

    2db86ab706d9b73feeb51a904be03b63bee92baf

    SHA256

    ebf9777bd307ed789ceabf282a9aca168c391c7f48e15a60939352efb3ea33f9

    SHA512

    7ec63b59d8f87a42689f544c2e8e7700da5d8720b37b41216cbd1372c47b1bc3b892020f0dd3a44a05f2a7c07471ff484e4165427f1a9cad0d2393840cd94e5b

  • C:\Users\Admin\AppData\Local\DBeaver\jre\legal\java.management\ASSEMBLY_EXCEPTION

    Filesize

    44B

    MD5

    7caf4cdbb99569deb047c20f1aad47c4

    SHA1

    24e7497426d27fe3c17774242883ccbed8f54b4d

    SHA256

    b998cda101e5a1ebcfb5ff9cddd76ed43a2f2169676592d428b7c0d780665f2a

    SHA512

    a1435e6f1e4e9285476a0e7bc3b4f645bbafb01b41798a2450390e16b18b242531f346373e01d568f6cc052932a3256e491a65e8b94b118069853f2b0c8cd619

  • C:\Users\Admin\AppData\Local\DBeaver\jre\legal\java.management\LICENSE

    Filesize

    33B

    MD5

    16989bab922811e28b64ac30449a5d05

    SHA1

    51ab20e8c19ee570bf6c496ec7346b7cf17bd04a

    SHA256

    86e0516b888276a492b19f9a84f5a866ed36925fae1510b3a94a0b6213e69192

    SHA512

    86571f127a6755a7339a9ed06e458c8dc5898e528de89e369a13c183711831af0646474986bae6573bc5155058d5f38348d6bfdeb3fd9318e98e0bf7916e6608

  • C:\Users\Admin\AppData\Local\DBeaver\plugins\org.jkiss.bundle.jfreechart_1.0.23\LICENSE.md

    Filesize

    11KB

    MD5

    14b2c87457eab0f575b762a5f9101569

    SHA1

    3302887523950842157f53ee738851be96317c6e

    SHA256

    fc5837b36a5b94ca9d6833afdc9f634832acc21995df0cacc8cb4313329bacaf

    SHA512

    2ccc2e6cf6db9512a04eee60408fca191dcbb480edf72a04364643501e79978518a79dffaa6bd5b0d6c873165720b5effbcc1eee50c8d8ae8f3f38c99ed02eea

  • C:\Users\Admin\AppData\Local\Temp\Cab586F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar58A0.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\nse8AD3.tmp\modern-wizard.bmp

    Filesize

    150KB

    MD5

    4336cb6ad378840f8fa1d180b152b2a8

    SHA1

    01cb79ec8164a2b8342dec6ec19cb032dc7230d5

    SHA256

    84944e08bccee7b5d6c910f8fb5665342b3a238409acc76ff564e31f0204d0c6

    SHA512

    92f2cc95284134d801b3c88407bee7d25090a07de3cff218f4f3eabfc14df270a97d15f8c89158b6e35eb054b89817cd0f6b6042f115d56cd7eb4376ce9bc28c

  • \Users\Admin\AppData\Local\DBeaver\dbeaver.exe

    Filesize

    520KB

    MD5

    818dbc331a283c689516dd0e291dafbb

    SHA1

    25b1d30640c86748f4516a2ef4da318cf8651f0c

    SHA256

    9604cbde72989fc6eabdc6a7d4d688188c73bec565d4e514eeec174ac0ea9c85

    SHA512

    6d8fea82a5a3be444c0825f4122c1ec4c69b0e801e02e2fc4cb673d66227be5c5cc63b8e225faf8c6afe9b24d7a56354480ccacc6fa3786e3aba008568a9fd65

  • \Users\Admin\AppData\Local\Temp\nse8AD3.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    68b287f4067ba013e34a1339afdb1ea8

    SHA1

    45ad585b3cc8e5a6af7b68f5d8269c97992130b3

    SHA256

    18e8b40ba22c7a1687bd16e8d585380bc2773fff5002d7d67e9485fcc0c51026

    SHA512

    06c38bbb07fb55256f3cdc24e77b3c8f3214f25bfd140b521a39d167113bf307a7e8d24e445d510bc5e4e41d33c9173bb14e3f2a38bc29a0e3d08c1f0dca4bdb

  • \Users\Admin\AppData\Local\Temp\nse8AD3.tmp\StartMenu.dll

    Filesize

    7KB

    MD5

    d070f3275df715bf3708beff2c6c307d

    SHA1

    93d3725801e07303e9727c4369e19fd139e69023

    SHA256

    42dd4dda3249a94e32e20f76eaffae784a5475ed00c60ef0197c8a2c1ccd2fb7

    SHA512

    fcaf625dac4684dad33d12e3a942b38489ecc90649eee885d823a932e70db63c1edb8614b9fa8904d1710e9b820e82c5a37aeb8403cf21cf1e3692f76438664d

  • \Users\Admin\AppData\Local\Temp\nse8AD3.tmp\System.dll

    Filesize

    12KB

    MD5

    cff85c549d536f651d4fb8387f1976f2

    SHA1

    d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e

    SHA256

    8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8

    SHA512

    531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88

  • \Users\Admin\AppData\Local\Temp\nse8AD3.tmp\UAC.dll

    Filesize

    14KB

    MD5

    adb29e6b186daa765dc750128649b63d

    SHA1

    160cbdc4cb0ac2c142d361df138c537aa7e708c9

    SHA256

    2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

    SHA512

    b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

  • \Users\Admin\AppData\Local\Temp\nse8AD3.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    2f69afa9d17a5245ec9b5bb03d56f63c

    SHA1

    e0a133222136b3d4783e965513a690c23826aec9

    SHA256

    e54989d2b83e7282d0bec56b098635146aab5d5a283f1f89486816851ef885a0

    SHA512

    bfd4af50e41ebc56e30355c722c2a55540a5bbddb68f1522ef7aabfe4f5f2a20e87fa9677ee3cdb3c0bf5bd3988b89d1224d32c9f23342a16e46c542d8dc0926

  • \Users\Admin\AppData\Local\Temp\nse8AD3.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    6c3f8c94d0727894d706940a8a980543

    SHA1

    0d1bcad901be377f38d579aafc0c41c0ef8dcefd

    SHA256

    56b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2

    SHA512

    2094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355